Vulnerability Description
Directory traversal vulnerability in the Realtyna Translator (com_realtyna) component 1.0.15 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realtyna | Com Realtyna | 1.0.15 |
| Joomla | Joomla\! | All versions |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.org/1004-exploits/joomlarealtyna-lfi.txtExploit
- http://www.exploit-db.com/exploits/14017Exploit
- http://www.securityfocus.com/bid/39337Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57647
- http://packetstormsecurity.org/1004-exploits/joomlarealtyna-lfi.txtExploit
- http://www.exploit-db.com/exploits/14017Exploit
- http://www.securityfocus.com/bid/39337Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57647
FAQ
What is CVE-2010-2682?
CVE-2010-2682 is a vulnerability with a CVSS score of 7.5 (HIGH). Directory traversal vulnerability in the Realtyna Translator (com_realtyna) component 1.0.15 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via ...
How severe is CVE-2010-2682?
CVE-2010-2682 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-2682?
Check the references section above for vendor advisories and patch information. Affected products include: Realtyna Com Realtyna, Joomla Joomla\!.